9
CVSSv2

CVE-2015-3628

Published: 07/12/2015 Updated: 06/06/2019
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
VMScore: 945
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

The iControl API in F5 BIG-IP LTM, AFM, Analytics, APM, ASM, Link Controller, and PEM 11.3.0 prior to 11.5.3 HF2 and 11.6.0 prior to 11.6.0 HF6, BIG-IP AAM 11.4.0 prior to 11.5.3 HF2 and 11.6.0 prior to 11.6.0 HF6, BIG-IP Edge Gateway, WebAccelerator, and WOM 11.3.0, BIG-IP GTM 11.3.0 prior to 11.6.0 HF6, BIG-IP PSM 11.3.0 up to and including 11.4.1, Enterprise Manager 3.1.0 up to and including 3.1.1, BIG-IQ Cloud and Security 4.0.0 up to and including 4.5.0, BIG-IQ Device 4.2.0 up to and including 4.5.0, and BIG-IQ ADC 4.5.0 allows remote authenticated users with the "Resource Administrator" role to gain privileges via an iCall (1) script or (2) handler in a SOAP request to iControl/iControlPortal.cgi.

Vulnerability Trend

Affected Products

Vendor Product Versions
F5Big-ip Access Policy Manager11.3.0, 11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.6.0
F5Big-ip Advanced Firewall Manager11.3.0, 11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.6.0
F5Big-ip Analytics11.3.0, 11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.6.0
F5Big-ip Application Acceleration Manager11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.6.0
F5Big-ip Application Security Manager11.3.0, 11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.6.0
F5Big-ip Edge Gateway11.3.0
F5Big-ip Enterprise Manager3.0.0, 3.1.0, 3.1.1
F5Big-ip Global Traffic Manager11.3.0, 11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.6.0
F5Big-ip Link Controller11.3.0, 11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.6.0
F5Big-ip Local Traffic Manager11.3.0, 11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.6.0
F5Big-ip Policy Enforcement Manager11.3.0, 11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.2, 11.5.3, 11.6.0
F5Big-ip Protocol Security Module11.3.0, 11.4.0, 11.4.1
F5Big-ip Wan Optimization Manager11.3.0
F5Big-ip Webaccelerator11.3.0
F5Big-iq Adc4.5.0
F5Big-iq Cloud4.0.0, 4.1.0, 4.2.0, 4.3.0, 4.4.0, 4.5.0
F5Big-iq Device4.2.0, 4.3.0, 4.4.0, 4.5.0
F5Big-iq Security4.0.0, 4.1.0, 4.2.0, 4.3.0, 4.4.0, 4.5.0

Exploits

## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'nokogiri' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper SOAPENV_ENCODINGSTYLE ...

Mailing Lists

This Metasploit module exploits an authenticated privilege escalation vulnerability in the iControl API on the F5 BIG-IP LTM (and likely other F5 devices) This requires valid credentials and the Resource Administrator role The exploit should work on BIG-IP 1130 - 1160, (115x < 1153 HF2 or 116x < 1160 HF6, see references for more ...

Metasploit Modules

F5 iControl iCall::Script Root Command Execution

This module exploits an authenticated privilege escalation vulnerability in the iControl API on the F5 BIG-IP LTM (and likely other F5 devices). This requires valid credentials and the Resource Administrator role. The exploit should work on BIG-IP 11.3.0 - 11.6.0, (11.5.x < 11.5.3 HF2 or 11.6.x < 11.6.0 HF6, see references for more details)

msf > use exploit/linux/http/f5_icall_cmd
      msf exploit(f5_icall_cmd) > show targets
            ...targets...
      msf exploit(f5_icall_cmd) > set TARGET <target-id>
      msf exploit(f5_icall_cmd) > show options
            ...show and set options...
      msf exploit(f5_icall_cmd) > exploit